US20070110247A1 - Intrusion detection with the key leg of a quantum key distribution system - Google Patents

Intrusion detection with the key leg of a quantum key distribution system Download PDF

Info

Publication number
US20070110247A1
US20070110247A1 US11/461,665 US46166506A US2007110247A1 US 20070110247 A1 US20070110247 A1 US 20070110247A1 US 46166506 A US46166506 A US 46166506A US 2007110247 A1 US2007110247 A1 US 2007110247A1
Authority
US
United States
Prior art keywords
recipient
polarization
bits
key
series
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/461,665
Inventor
Cary Murphy
David Vokey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Network Integrity Systems Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/461,665 priority Critical patent/US20070110247A1/en
Assigned to NETWORK INTEGRITY SYSTEMS INC. reassignment NETWORK INTEGRITY SYSTEMS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VOKEY, DAVID E., MURPHY, CARY R.
Publication of US20070110247A1 publication Critical patent/US20070110247A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Definitions

  • This invention relates to a method secure transmission of data using a quantum key distribution system.
  • a shortcoming of key based encryption systems used for data security is maintenance of the key.
  • the key is a “shared secret” which users at each end of a communication channel must both know, but any intruder must not. In secure networks, much effort is expended in keeping this key secret, because when the key is known the data can be decrypted.
  • QKD quantum key distribution
  • Quantum Key Distribution System In a Quantum Key Distribution System (QKD), two sets of transmissions are present between the source at one end and the recipient at the other end.
  • the data path carries encrypted high-speed information, similar to what would be carried on a secure network.
  • the key path carries a low-speed key to the encryption, used for decoding the information on the data path, and which is constantly being changed. This key is encrypted at the quantum level, with a single photon per data bit. The most common method of quantum encoding is with changing the SOP.
  • the encryption key is based on a series of bits and systems for key based encryption using such keys are well known to persons skilled in this art.
  • the encryption key is transmitted from the source to the recipient along an optical fiber using a series of individual photons each having a state of polarization and the state of polarization of the series of photons as transmitted by the source is detected at the recipient. It is well known that the polarization of each photon cannot be detected without changing its state of polarization.
  • a communications protocol between the source and the recipient is arranged to determine which of the bits defined by the state of polarization of the stream of photons are used in the key. This communications protocol acts to select the bits without revealing in the communications what is the content of those bits.
  • the change in SOP of the key leg of a Quantum Key Distribution system is monitored for reception of the key using standard polarization detection techniques, and dropped bits in the key path cause the key to be rebroadcast or changed.
  • the encryption key being based on a series of bits
  • photons to be used for the series of bits is determined by a communications protocol between the source and the recipient;
  • the communications protocol includes detecting a number of bits which fail to be accurately detected by the recipient
  • incidents of dropped bits are analyzed, potentially revealing fiber handling as a possible prelude to theft or to more damaging intrusion. Transmission can be then discontinued or misinformation transmitted.
  • Detection or measurement of the handling or disturbance of the optical fiber or cable in the key path either as a prelude to, incident of, or as a result of an intrusion, as detected by any shift in the degree or state of polarization of any portion of the light contained therein, originating from, or propagating through the optical fiber or cable carrying the key signal.
  • FIG. 1 is a schematic illustration of a Quantum Key Distribution system according to the present invention.
  • FIGS. 2 to 6 are schematic illustrations of algorithms for use in the system according to the present invention for analyzing the numbers of dropped bits.
  • Handling of the fiber cable causes a local mechanical disturbance to the fiber.
  • This mechanical disturbance while not introducing detectable macro or micro bending losses, causes the polarization orientation to change. This is detected by the dropping of bits and reported to the processor. A more comprehensive view is now described.
  • the signal is filtered to eliminate normal environmental background noise.
  • the filtered signal is then analyzed for transient signatures and level changes that are characteristic of cable and fiber handling. At a pre-set disturbance level or slope change the circuit activates the alarm response.
  • the processing to determine handling is not insignificant, and can be accomplished in several ways including, but not limited to: Threshold Detection, Leaky Bucket Filtering, Frequency Envelope Detection (FED), and Waterfall FED.
  • Threshold Detection as shown in FIG. 1 is a simple monitoring the transient level of the signal exiting the key leg of the QKD system. When the level changes more than a pre-determined level, an alarm is registered. Due to the nature of states of polarization, this change can be positive or negative in direction.
  • a time element is added to threshold detection, this includes the so-called Leaky Bucket analysis.
  • Leaky Bucket analysis At the beginning of each time window the level is referenced.
  • a signal of larger than normal shift or faster than normal slew during any time slice will register an alarm.
  • the system installation should be characterised to determine what is a suitable threshold.
  • FIG. 3 shows a frequency spectrum of the change in amplitude of the key leg. Since the key leg consists of individual photons, these detections may be integrated, or otherwise processed, to create a usable quasi-continuous waveform for analysis. This spectrum is “sliced” into manageable sections for discrete analysis.
  • FIG. 4 illustrates taking the slices from FIG. 3 and processing them individually.
  • a “leaky bucket” as described above, or other filtering and detection mechanisms could be applied to each slice. This will help to diminish sensitivity to any period ambient signatures in the signal, such as a vibrating fiber.
  • FIG. 5 is an illustration of frequency envelope detection, where a spectra of a “normal” condition is compared to that of the current or stored condition, and compared for detection of anomaly- signifying fiber perturbation
  • FIG. 6 represents a Waterfall FED, which adds another dimension to the analysis. Fiber perturbation not only contain both amplitude and frequency components, but the frequency components change, or evolve, over time. Analysis of this evolution can help discriminate a perturbation from an ambient event.

Abstract

In a method for secure transmission of data using a quantum key distribution system where individual photons each having a state of polarization are transmitted from the source to the recipient and where the state of polarization the photons is used to provide the series of bits of the encryption key, manipulation of the optical fiber causing movement of a portion of the fiber indicative of an intrusion event is obtained by analyzing changes in time of the number of dropped bits which is those bits which fail to be accurately detected by the recipient since such changes are indicative of changes in polarization of the photons due to handling of the fiber.

Description

  • This application claims the benefit of the priority date under 35USC119 from Provisional Application 60/704,919 filed 3 Aug. 2005.
  • This invention relates to a method secure transmission of data using a quantum key distribution system.
  • BACKGROUND OF THE INVENTION
  • A shortcoming of key based encryption systems used for data security is maintenance of the key. The key is a “shared secret” which users at each end of a communication channel must both know, but any intruder must not. In secure networks, much effort is expended in keeping this key secret, because when the key is known the data can be decrypted.
  • One method used for this key encryption is a system called quantum key distribution (QKD). This system rapidly changes the key, and transmits the new key over an optical fiber is such a way that interception of the key is detected by virtue of the transmission method. This method relies upon laws of quantum electrodynamics, which state that monitoring any event at the atomic or subatomic level changes that event.
  • How this is accomplished in QKD is to broadcast the key as an individual photon per bit of data, and at a controlled state of polarization. The measurement of the state of polarization (SOP) in fact alters that very state. This precludes an eves-dropper from learning the key.
  • In a Quantum Key Distribution System (QKD), two sets of transmissions are present between the source at one end and the recipient at the other end. The data path carries encrypted high-speed information, similar to what would be carried on a secure network. The key path carries a low-speed key to the encryption, used for decoding the information on the data path, and which is constantly being changed. This key is encrypted at the quantum level, with a single photon per data bit. The most common method of quantum encoding is with changing the SOP.
  • The encryption key is based on a series of bits and systems for key based encryption using such keys are well known to persons skilled in this art. The encryption key is transmitted from the source to the recipient along an optical fiber using a series of individual photons each having a state of polarization and the state of polarization of the series of photons as transmitted by the source is detected at the recipient. It is well known that the polarization of each photon cannot be detected without changing its state of polarization. A communications protocol between the source and the recipient is arranged to determine which of the bits defined by the state of polarization of the stream of photons are used in the key. This communications protocol acts to select the bits without revealing in the communications what is the content of those bits.
  • Inherently in the system some of the bits are lost or mis-communicated so that their content is lost. It will be appreciated that the determination of the phase of a photon is difficult and is required to be effected at a considerable distance from the source and errors occur for various reasons within the system. The typical protocol used at this time includes a system for detecting such bits which fail to be accurately detected by the recipient which are considered as “dropped bits”. Of course such bits cannot be used in the key and both the source and the recipient must know what and where those bits are.
  • Thus in current systems, the change in SOP of the key leg of a Quantum Key Distribution system is monitored for reception of the key using standard polarization detection techniques, and dropped bits in the key path cause the key to be rebroadcast or changed.
  • SUMMARY OF THE INVENTION
  • It is one object of the present invention to provide an improved method for secure communication of data using the QKD system.
  • According to the invention therefore there is provided a method for secure transmission of data comprising:
  • transmitting data from a source to a recipient;
  • at the source encrypting the data using a secret encryption key;
  • at the recipient decrypting the encrypted data using the secret encryption key;
  • the encryption key being based on a series of bits;
  • transmitting the encryption key from the source to the recipient along an optical fiber using a series of individual photons each having a state of polarization;
  • wherein the state of polarization of at least some of the series of the photons is used to provide the series of bits of the encryption key;
  • wherein the polarization of each photon cannot be detected without changing its state of polarization or otherwise affecting the photon;
  • wherein the state of polarization of the series of photons as transmitted by the source is detected at the recipient;
  • wherein the photons to be used for the series of bits is determined by a communications protocol between the source and the recipient;
  • and wherein the communications protocol includes detecting a number of bits which fail to be accurately detected by the recipient;
  • and detecting manipulation of the optical fiber causing movement of a portion thereof along the length thereof indicative of an intrusion event by analyzing changes in time of the number of bits which fail to be accurately detected by the recipient.
  • In this invention, incidents of dropped bits are analyzed, potentially revealing fiber handling as a possible prelude to theft or to more damaging intrusion. Transmission can be then discontinued or misinformation transmitted.
  • Detection or measurement of the handling or disturbance of the optical fiber or cable in the key path, either as a prelude to, incident of, or as a result of an intrusion, as detected by any shift in the degree or state of polarization of any portion of the light contained therein, originating from, or propagating through the optical fiber or cable carrying the key signal.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • One embodiment of the invention will now be described in conjunction with the accompanying drawings in which:
  • FIG. 1 is a schematic illustration of a Quantum Key Distribution system according to the present invention.
  • FIGS. 2 to 6 are schematic illustrations of algorithms for use in the system according to the present invention for analyzing the numbers of dropped bits.
  • In the drawings like characters of reference indicate corresponding parts in the different figures.
  • DETAILED DESCRIPTION
  • Handling of the fiber cable causes a local mechanical disturbance to the fiber. This mechanical disturbance, while not introducing detectable macro or micro bending losses, causes the polarization orientation to change. This is detected by the dropping of bits and reported to the processor. A more comprehensive view is now described.
  • This is forwarded to the processor where the signal is filtered to eliminate normal environmental background noise. The filtered signal is then analyzed for transient signatures and level changes that are characteristic of cable and fiber handling. At a pre-set disturbance level or slope change the circuit activates the alarm response.
  • Since intrusions tend to be very slow occurrences, on the order of hundreds of milliseconds, there is ample time to average readings under each measurement state.
  • The processing required for signal analysis of an intrusion detection system is not insignificant, algorithms which analyze the environment and filter out disturbances to be ignored are highly computationally intensive.
  • The processing to determine handling is not insignificant, and can be accomplished in several ways including, but not limited to: Threshold Detection, Leaky Bucket Filtering, Frequency Envelope Detection (FED), and Waterfall FED.
  • Threshold Detection as shown in FIG. 1 is a simple monitoring the transient level of the signal exiting the key leg of the QKD system. When the level changes more than a pre-determined level, an alarm is registered. Due to the nature of states of polarization, this change can be positive or negative in direction.
  • In FIG. 2, a time element is added to threshold detection, this includes the so-called Leaky Bucket analysis. In this figure, at the beginning of each time window the level is referenced. A signal of larger than normal shift or faster than normal slew during any time slice will register an alarm. The system installation should be characterised to determine what is a suitable threshold.
  • FIG. 3 shows a frequency spectrum of the change in amplitude of the key leg. Since the key leg consists of individual photons, these detections may be integrated, or otherwise processed, to create a usable quasi-continuous waveform for analysis. This spectrum is “sliced” into manageable sections for discrete analysis.
  • FIG. 4 illustrates taking the slices from FIG. 3 and processing them individually. For example, a “leaky bucket” as described above, or other filtering and detection mechanisms, could be applied to each slice. This will help to diminish sensitivity to any period ambient signatures in the signal, such as a vibrating fiber.
  • FIG. 5 is an illustration of frequency envelope detection, where a spectra of a “normal” condition is compared to that of the current or stored condition, and compared for detection of anomaly- signifying fiber perturbation
  • FIG. 6 represents a Waterfall FED, which adds another dimension to the analysis. Fiber perturbation not only contain both amplitude and frequency components, but the frequency components change, or evolve, over time. Analysis of this evolution can help discriminate a perturbation from an ambient event.
  • Reference is made to co-pending application Ser. No. INSERT filed on the same day as the present application (attorney docket 85570-702) entitled FREQUENCY ENVELOPE DETECTION METHOD FOR SIGNAL ANALYSIS which provides additional disclosure in relation to the above techniques, the disclosure of which is incorporated herein by reference.
  • Since various modifications can be made in my invention as herein above described, and many apparently widely different embodiments of same made within the spirit and scope of the claims without department from such spirit and scope, it is intended that all matter contained in the accompanying specification shall be interpreted as illustrative only and not in a limiting sense.

Claims (1)

1. A method for secure transmission of data comprising:
transmitting data from a source to a recipient;
at the source encrypting the data using a secret encryption key;
at the recipient decrypting the encrypted data using the secret encryption key;
the encryption key being based on a series of bits;
transmitting the encryption key from the source to the recipient along an optical fiber using a series of individual photons each having a state of polarization;
wherein the state of polarization of at least some of the series of the photons is used to provide the series of bits of the encryption key;
wherein the polarization of each photon cannot be detected without changing its state of polarization or otherwise affecting the photon;
wherein the state of polarization of the series of photons as transmitted by the source is detected at the recipient;
wherein the photons to be used for the series of bits is determined by a communications protocol between the source and the recipient;
and wherein the communications protocol includes detecting a number of bits which fail to be accurately detected by the recipient;
and detecting manipulation of the optical fiber causing movement of a portion thereof along the length thereof indicative of an intrusion event by analyzing changes in time of the number of bits which fail to be accurately detected by the recipient.
US11/461,665 2005-08-03 2006-08-01 Intrusion detection with the key leg of a quantum key distribution system Abandoned US20070110247A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/461,665 US20070110247A1 (en) 2005-08-03 2006-08-01 Intrusion detection with the key leg of a quantum key distribution system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US70491905P 2005-08-03 2005-08-03
US11/461,665 US20070110247A1 (en) 2005-08-03 2006-08-01 Intrusion detection with the key leg of a quantum key distribution system

Publications (1)

Publication Number Publication Date
US20070110247A1 true US20070110247A1 (en) 2007-05-17

Family

ID=38345588

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/461,665 Abandoned US20070110247A1 (en) 2005-08-03 2006-08-01 Intrusion detection with the key leg of a quantum key distribution system

Country Status (2)

Country Link
US (1) US20070110247A1 (en)
WO (1) WO2007092041A2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070069893A1 (en) * 2005-03-04 2007-03-29 Compudyne Corporation Polarization-based sensor for secure fiber optic network and other security applications
US20070096007A1 (en) * 2005-08-29 2007-05-03 Compudyne Corporation Distributed fiber optic sensor with location capability
US20080144992A1 (en) * 2006-07-19 2008-06-19 Fiber Sensys Llc Fiber-optic mat sensor
US20090080898A1 (en) * 2007-09-24 2009-03-26 Fiber Sensys Llc Method and apparatus for reducing noise in a fiber-optic sensor
US20140294390A1 (en) * 2010-04-06 2014-10-02 Christopher M. Badinelli Method and apparatus for protecting fiber optic distribution systems
US20160218800A1 (en) * 2012-12-31 2016-07-28 Network Integrity Systems, Inc. Alarm System for an Optical Network
CN108880808A (en) * 2018-08-06 2018-11-23 广东石油化工学院 A kind of quantum-key distribution equipment is at code rate test method and system
CN111970279A (en) * 2020-08-18 2020-11-20 中南大学 Continuous variable quantum key distribution attack detection method and detection system thereof

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5675648A (en) * 1992-12-24 1997-10-07 British Telecommunications Public Limited Company System and method for key distribution using quantum cryptography
US5732139A (en) * 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
US5768378A (en) * 1993-09-09 1998-06-16 British Telecommunications Public Limited Company Key distribution in a multiple access network using quantum cryptography
US5850441A (en) * 1993-09-09 1998-12-15 British Telecommunications Public Limited Company System and method for key distribution using quantum cryptography
US5953421A (en) * 1995-08-16 1999-09-14 British Telecommunications Public Limited Company Quantum cryptography
US20030169880A1 (en) * 2002-02-22 2003-09-11 Nec Corporation Quantum cryptography key distribution system and method
US20060083379A1 (en) * 2004-10-19 2006-04-20 Brookner George M Cryptographic communications session security
US7227955B2 (en) * 2003-02-07 2007-06-05 Magiq Technologies, Inc. Single-photon watch dog detector for folded quantum key distribution system
US7333611B1 (en) * 2002-09-27 2008-02-19 Northwestern University Ultra-secure, ultra-efficient cryptographic system
US7349545B2 (en) * 2000-03-24 2008-03-25 Samsung Electronics Co., Ltd. Key agreement method in secure communication system using multiple access method
US7430295B1 (en) * 2003-03-21 2008-09-30 Bbn Technologies Corp. Simple untrusted network for quantum cryptography
US7515716B1 (en) * 2004-02-26 2009-04-07 Bbn Technologies Corp. Systems and methods for reserving cryptographic key material

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5675648A (en) * 1992-12-24 1997-10-07 British Telecommunications Public Limited Company System and method for key distribution using quantum cryptography
US5768378A (en) * 1993-09-09 1998-06-16 British Telecommunications Public Limited Company Key distribution in a multiple access network using quantum cryptography
US5850441A (en) * 1993-09-09 1998-12-15 British Telecommunications Public Limited Company System and method for key distribution using quantum cryptography
US5953421A (en) * 1995-08-16 1999-09-14 British Telecommunications Public Limited Company Quantum cryptography
US5732139A (en) * 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
US7349545B2 (en) * 2000-03-24 2008-03-25 Samsung Electronics Co., Ltd. Key agreement method in secure communication system using multiple access method
US20030169880A1 (en) * 2002-02-22 2003-09-11 Nec Corporation Quantum cryptography key distribution system and method
US7333611B1 (en) * 2002-09-27 2008-02-19 Northwestern University Ultra-secure, ultra-efficient cryptographic system
US7227955B2 (en) * 2003-02-07 2007-06-05 Magiq Technologies, Inc. Single-photon watch dog detector for folded quantum key distribution system
US7430295B1 (en) * 2003-03-21 2008-09-30 Bbn Technologies Corp. Simple untrusted network for quantum cryptography
US7515716B1 (en) * 2004-02-26 2009-04-07 Bbn Technologies Corp. Systems and methods for reserving cryptographic key material
US20060083379A1 (en) * 2004-10-19 2006-04-20 Brookner George M Cryptographic communications session security

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070069893A1 (en) * 2005-03-04 2007-03-29 Compudyne Corporation Polarization-based sensor for secure fiber optic network and other security applications
US20070096007A1 (en) * 2005-08-29 2007-05-03 Compudyne Corporation Distributed fiber optic sensor with location capability
US7514670B2 (en) 2005-08-29 2009-04-07 Fiber Sensys Llc Distributed fiber optic sensor with location capability
US20080144992A1 (en) * 2006-07-19 2008-06-19 Fiber Sensys Llc Fiber-optic mat sensor
US7532781B2 (en) 2006-07-19 2009-05-12 Fiber Sensys Llc Fiber-optic mat sensor
US20090080898A1 (en) * 2007-09-24 2009-03-26 Fiber Sensys Llc Method and apparatus for reducing noise in a fiber-optic sensor
US20140294390A1 (en) * 2010-04-06 2014-10-02 Christopher M. Badinelli Method and apparatus for protecting fiber optic distribution systems
US9490929B2 (en) * 2010-04-06 2016-11-08 Christopher M. Badinelli Method and apparatus for protecting fiber optic distribution systems
US20160218800A1 (en) * 2012-12-31 2016-07-28 Network Integrity Systems, Inc. Alarm System for an Optical Network
US9954609B2 (en) * 2012-12-31 2018-04-24 Network Integrity Systems Inc. Alarm system for an optical network
CN108880808A (en) * 2018-08-06 2018-11-23 广东石油化工学院 A kind of quantum-key distribution equipment is at code rate test method and system
CN111970279A (en) * 2020-08-18 2020-11-20 中南大学 Continuous variable quantum key distribution attack detection method and detection system thereof

Also Published As

Publication number Publication date
WO2007092041A2 (en) 2007-08-16
WO2007092041A3 (en) 2009-04-30

Similar Documents

Publication Publication Date Title
US20070110247A1 (en) Intrusion detection with the key leg of a quantum key distribution system
US20070113268A1 (en) Intrusion resistant passive fiber optic components
Karatas et al. Deep learning in intrusion detection systems
CA2532079C (en) Remote monitoring system for water supply network
US8077047B2 (en) Tampering detection system using quantum-mechanical systems
Tandiya et al. Deep predictive coding neural network for rf anomaly detection in wireless networks
EP1741223B1 (en) Method, apparatus and computer program for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
US9800595B2 (en) Methods, systems, and computer readable media for detecting physical link intrusions
EP3503457B1 (en) Method and device for recognizing blinding attacks in a quantum encrypted channel
WO2003067847A3 (en) Integrated network intrusion detection
KR20060123054A (en) Multimode fiber optic intrusion detection system
Williams et al. Tamper-indicating quantum seal
Gobby et al. Unconditionally secure quantum key distribution over 50km of standard telecom fibre
US20190245615A1 (en) Secured fiber link system
Iglesias et al. DAT detectors: uncovering TCP/IP covert channels by descriptive analytics
US7920705B1 (en) System and method for convert channel detection
Gulomov et al. Method for security monitoring and special filtering traffic mode in info communication systems
Quader et al. Persistent threat pattern discovery
Wiley Blocking-resistant protocol classification using bayesian model selection
KR20120074040A (en) Security system and its operating method for supervisory control and data acquisition system
AU2008255572B2 (en) Optical communications security device and system
CN108738016B (en) Efficient detection method for coding channel information hiding technology
EP2351317B1 (en) Tool for the centralised supervision and/or hypervision of a set of systems having different security levels
Benedetto et al. A novel method for securing critical infrastructures by detecting hidden flows of data
US20220278995A1 (en) Privacy-preserving online botnet classification system utilizing power footprint of iot connected devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: NETWORK INTEGRITY SYSTEMS INC.,NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MURPHY, CARY R.;VOKEY, DAVID E.;SIGNING DATES FROM 20060929 TO 20061003;REEL/FRAME:018399/0171

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION